use std::collections::{BTreeMap, HashSet};
use std::io::Write;
use std::ops::ControlFlow;
use std::path::{Path, PathBuf};
use std::time::{Duration, Instant};
use std::{env, ffi};
use anyhow::{anyhow, bail, Context, Result};
use bitcoin::Txid;
use clap::Subcommand;
use fedimint_core::core::LEGACY_HARDCODED_INSTANCE_ID_WALLET;
use fedimint_core::encoding::Decodable;
use fedimint_core::envs::is_env_var_set;
use fedimint_core::module::registry::ModuleRegistry;
use fedimint_core::net::api_announcement::SignedApiAnnouncement;
use fedimint_core::task::block_in_place;
use fedimint_core::{Amount, PeerId};
use fedimint_ln_client::cli::LnInvoiceResponse;
use fedimint_logging::LOG_DEVIMINT;
use futures::future::try_join_all;
use hex::ToHex;
use ln_gateway::rpc::GatewayInfo;
use serde_json::json;
use tokio::net::TcpStream;
use tokio::{fs, try_join};
use tracing::{debug, info};
use crate::cli::{cleanup_on_exit, exec_user_command, setup, write_ready_file, CommonArgs};
use crate::envs::{FM_DATA_DIR_ENV, FM_DEVIMINT_RUN_DEPRECATED_TESTS_ENV, FM_PASSWORD_ENV};
use crate::federation::{Client, Federation};
use crate::util::{poll, LoadTestTool, ProcessManager};
use crate::version_constants::{
VERSION_0_3_0, VERSION_0_3_0_ALPHA, VERSION_0_4_0, VERSION_0_4_0_ALPHA, VERSION_0_5_0_ALPHA,
};
use crate::{cmd, dev_fed, poll_eq, DevFed, Gatewayd, LightningNode, Lightningd, Lnd};
pub struct Stats {
pub min: Duration,
pub avg: Duration,
pub median: Duration,
pub p90: Duration,
pub max: Duration,
pub sum: Duration,
}
impl std::fmt::Display for Stats {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "min: {:.1}s", self.min.as_secs_f32())?;
write!(f, ", avg: {:.1}s", self.avg.as_secs_f32())?;
write!(f, ", median: {:.1}s", self.median.as_secs_f32())?;
write!(f, ", p90: {:.1}s", self.p90.as_secs_f32())?;
write!(f, ", max: {:.1}s", self.max.as_secs_f32())?;
write!(f, ", sum: {:.1}s", self.sum.as_secs_f32())?;
Ok(())
}
}
pub fn stats_for(mut v: Vec<Duration>) -> Stats {
assert!(!v.is_empty());
v.sort();
let n = v.len();
let min = v.first().unwrap().to_owned();
let max = v.iter().last().unwrap().to_owned();
let median = v[n / 2];
let sum: Duration = v.iter().sum();
let avg = sum / n as u32;
let p90 = v[(n as f32 * 0.9) as usize];
Stats {
min,
avg,
median,
p90,
max,
sum,
}
}
pub async fn log_binary_versions() -> Result<()> {
let fedimint_cli_version = cmd!(crate::util::get_fedimint_cli_path(), "--version")
.out_string()
.await?;
info!(?fedimint_cli_version);
let fedimint_cli_version_hash = cmd!(crate::util::get_fedimint_cli_path(), "version-hash")
.out_string()
.await?;
info!(?fedimint_cli_version_hash);
let gateway_cli_version = cmd!(crate::util::get_gateway_cli_path(), "--version")
.out_string()
.await?;
info!(?gateway_cli_version);
let gateway_cli_version_hash = cmd!(crate::util::get_gateway_cli_path(), "version-hash")
.out_string()
.await?;
info!(?gateway_cli_version_hash);
let fedimintd_version_hash = cmd!(crate::util::FedimintdCmd, "version-hash")
.out_string()
.await?;
info!(?fedimintd_version_hash);
let gatewayd_version_hash = cmd!(crate::util::Gatewayd, "version-hash")
.out_string()
.await?;
info!(?gatewayd_version_hash);
Ok(())
}
pub async fn latency_tests(
dev_fed: DevFed,
r#type: LatencyTest,
upgrade_clients: Option<&UpgradeClients>,
iterations: usize,
assert_thresholds: bool,
) -> Result<()> {
log_binary_versions().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0 || gatewayd_version < *VERSION_0_3_0 {
info!("fedmint-cli version that didn't support unknown modules");
return Ok(());
}
let DevFed {
cln, fed, gw_lnd, ..
} = dev_fed;
let max_p90_factor = 5.0;
let p90_median_factor = 10;
let client = match upgrade_clients {
Some(c) => match r#type {
LatencyTest::Reissue => c.reissue_client.clone(),
LatencyTest::LnSend => c.ln_send_client.clone(),
LatencyTest::LnReceive => c.ln_receive_client.clone(),
LatencyTest::FmPay => c.fm_pay_client.clone(),
LatencyTest::Restore => bail!("no reusable upgrade client for restore"),
},
None => fed.new_joined_client("latency-tests-client").await?,
};
client.use_gateway(&gw_lnd).await?;
let initial_balance_sats = 100_000_000;
fed.pegin_client(initial_balance_sats, &client).await?;
let lnd_gw_id = gw_lnd.gateway_id().await?;
match r#type {
LatencyTest::Reissue => {
info!("Testing latency of reissue");
let mut reissues = Vec::with_capacity(iterations);
let amount_per_iteration_msats =
((initial_balance_sats * 1000 / iterations as u64).next_power_of_two() >> 1) - 1;
for _ in 0..iterations {
let notes = cmd!(client, "spend", amount_per_iteration_msats.to_string())
.out_json()
.await?["notes"]
.as_str()
.context("note must be a string")?
.to_owned();
let start_time = Instant::now();
cmd!(client, "reissue", notes).run().await?;
reissues.push(start_time.elapsed());
}
let reissue_stats = stats_for(reissues);
println!("### LATENCY REISSUE: {reissue_stats}");
if assert_thresholds {
assert!(reissue_stats.median < Duration::from_secs(10));
assert!(reissue_stats.p90 < reissue_stats.median * p90_median_factor);
assert!(
reissue_stats.max.as_secs_f64()
< reissue_stats.p90.as_secs_f64() * max_p90_factor
);
}
}
LatencyTest::LnSend => {
info!("Testing latency of ln send");
let mut ln_sends = Vec::with_capacity(iterations);
for i in 0..iterations {
let invoice = cln
.invoice(1_000_000, format!("Description{i}"), format!("Label{i}"))
.await?;
let start_time = Instant::now();
ln_pay(&client, invoice, lnd_gw_id.clone(), false).await?;
cln.wait_any_bolt11_invoice().await?;
ln_sends.push(start_time.elapsed());
}
let ln_sends_stats = stats_for(ln_sends);
println!("### LATENCY LN SEND: {ln_sends_stats}");
if assert_thresholds {
assert!(ln_sends_stats.median < Duration::from_secs(10));
assert!(ln_sends_stats.p90 < ln_sends_stats.median * p90_median_factor);
assert!(
ln_sends_stats.max.as_secs_f64()
< ln_sends_stats.p90.as_secs_f64() * max_p90_factor
);
}
}
LatencyTest::LnReceive => {
info!("Testing latency of ln receive");
let mut ln_receives = Vec::with_capacity(iterations);
let invoice = cln
.invoice(
10_000_000,
"LnReceiveLatencyDesc".to_string(),
"LatencyLabel".to_string(),
)
.await?;
ln_pay(&client, invoice, lnd_gw_id.clone(), false).await?;
for _ in 0..iterations {
let invoice = ln_invoice(
&client,
Amount::from_msats(100_000),
"latency-over-lnd-gw".to_string(),
lnd_gw_id.clone(),
)
.await?
.invoice;
let start_time = Instant::now();
cln.pay_bolt11_invoice(invoice).await?;
ln_receives.push(start_time.elapsed());
}
let ln_receives_stats = stats_for(ln_receives);
println!("### LATENCY LN RECV: {ln_receives_stats}");
if assert_thresholds {
assert!(ln_receives_stats.median < Duration::from_secs(10));
assert!(ln_receives_stats.p90 < ln_receives_stats.median * p90_median_factor);
assert!(
ln_receives_stats.max.as_secs_f64()
< ln_receives_stats.p90.as_secs_f64() * max_p90_factor
);
}
}
LatencyTest::FmPay => {
info!("Testing latency of internal payments within a federation");
let mut fm_internal_pay = Vec::with_capacity(iterations);
let sender = fed.new_joined_client("internal-swap-sender").await?;
fed.pegin_client(10_000_000, &sender).await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let default_internal = fedimint_cli_version <= *VERSION_0_3_0;
for _ in 0..iterations {
let recv = if default_internal {
cmd!(
client,
"ln-invoice",
"--amount=1000000msat",
"--description=internal-swap-invoice"
)
.out_json()
.await?
} else {
cmd!(
client,
"ln-invoice",
"--amount=1000000msat",
"--description=internal-swap-invoice",
"--force-internal"
)
.out_json()
.await?
};
let invoice = recv["invoice"]
.as_str()
.context("invoice must be string")?
.to_owned();
let recv_op = recv["operation_id"]
.as_str()
.context("operation id must be string")?
.to_owned();
let start_time = Instant::now();
if default_internal {
cmd!(sender, "ln-pay", invoice).run().await?;
} else {
cmd!(sender, "ln-pay", invoice, "--force-internal")
.run()
.await?;
}
cmd!(client, "await-invoice", recv_op).run().await?;
fm_internal_pay.push(start_time.elapsed());
}
let fm_pay_stats = stats_for(fm_internal_pay);
println!("### LATENCY FM PAY: {fm_pay_stats}");
if assert_thresholds {
assert!(fm_pay_stats.median < Duration::from_secs(15));
assert!(fm_pay_stats.p90 < fm_pay_stats.median * p90_median_factor);
assert!(
fm_pay_stats.max.as_secs_f64()
< fm_pay_stats.p90.as_secs_f64() * max_p90_factor
);
}
}
LatencyTest::Restore => {
info!("Testing latency of restore");
let backup_secret = cmd!(client, "print-secret").out_json().await?["secret"]
.as_str()
.map(ToOwned::to_owned)
.unwrap();
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let fedimintd_version = crate::util::FedimintdCmd::version_or_default().await;
if !is_env_var_set(FM_DEVIMINT_RUN_DEPRECATED_TESTS_ENV)
&& (fedimint_cli_version < *VERSION_0_3_0_ALPHA
|| fedimintd_version < *VERSION_0_3_0_ALPHA)
{
info!("Skipping tests, as in previous versions restore was very slow to test");
return Ok(());
}
let start_time = Instant::now();
if *VERSION_0_3_0_ALPHA <= fedimint_cli_version {
let restore_client = Client::create("restore").await?;
cmd!(
restore_client,
"restore",
"--mnemonic",
&backup_secret,
"--invite-code",
fed.invite_code()?
)
.run()
.await?;
} else {
let client = client.new_forked("restore-without-backup").await?;
let _ = cmd!(client, "wipe", "--force",).out_json().await?;
assert_eq!(
0,
cmd!(client, "info").out_json().await?["total_amount_msat"]
.as_u64()
.unwrap()
);
let _post_balance = cmd!(client, "restore", &backup_secret)
.out_json()
.await?
.as_u64()
.unwrap();
}
let restore_time = start_time.elapsed();
println!("### LATENCY RESTORE: {restore_time:?}");
if assert_thresholds {
if crate::util::is_backwards_compatibility_test() {
assert!(restore_time < Duration::from_secs(160));
} else {
assert!(restore_time < Duration::from_secs(30));
}
}
}
}
Ok(())
}
pub struct UpgradeClients {
reissue_client: Client,
ln_send_client: Client,
ln_receive_client: Client,
fm_pay_client: Client,
}
async fn stress_test_fed(dev_fed: &DevFed, clients: Option<&UpgradeClients>) -> anyhow::Result<()> {
use futures::FutureExt;
let assert_thresholds = false;
let restore_test = if clients.is_some() {
futures::future::ok(()).right_future()
} else {
latency_tests(
dev_fed.clone(),
LatencyTest::Restore,
clients,
20,
assert_thresholds,
)
.left_future()
};
latency_tests(
dev_fed.clone(),
LatencyTest::Reissue,
clients,
20,
assert_thresholds,
)
.await?;
latency_tests(
dev_fed.clone(),
LatencyTest::LnSend,
clients,
20,
assert_thresholds,
)
.await?;
latency_tests(
dev_fed.clone(),
LatencyTest::LnReceive,
clients,
20,
assert_thresholds,
)
.await?;
latency_tests(
dev_fed.clone(),
LatencyTest::FmPay,
clients,
20,
assert_thresholds,
)
.await?;
restore_test.await?;
Ok(())
}
pub async fn upgrade_tests(process_mgr: &ProcessManager, binary: UpgradeTest) -> Result<()> {
match binary {
UpgradeTest::Fedimintd { paths } => {
if let Some(oldest_fedimintd) = paths.first() {
std::env::set_var("FM_FEDIMINTD_BASE_EXECUTABLE", oldest_fedimintd);
} else {
bail!("Must provide at least 1 binary path");
}
let fedimintd_version = crate::util::FedimintdCmd::version_or_default().await;
info!(
"running first stress test for fedimintd version: {}",
fedimintd_version
);
let mut dev_fed = dev_fed(process_mgr).await?;
let client = dev_fed.fed.new_joined_client("test-client").await?;
try_join!(stress_test_fed(&dev_fed, None), client.wait_session())?;
for path in paths.iter().skip(1) {
dev_fed.fed.restart_all_with_bin(process_mgr, path).await?;
try_join!(stress_test_fed(&dev_fed, None), client.wait_session())?;
dev_fed.fed.terminate_server(1).await?;
try_join!(stress_test_fed(&dev_fed, None), client.wait_session())?;
let fedimintd_version = crate::util::FedimintdCmd::version_or_default().await;
info!(
"### fedimintd passed stress test for version {}",
fedimintd_version
);
}
info!("## fedimintd upgraded all binaries successfully");
}
UpgradeTest::FedimintCli { paths } => {
let set_fedimint_cli_path = |path: &PathBuf| {
std::env::set_var("FM_FEDIMINT_CLI_BASE_EXECUTABLE", path);
let fm_mint_client: String = format!(
"{fedimint_cli} --data-dir {datadir}",
fedimint_cli = crate::util::get_fedimint_cli_path().join(" "),
datadir = crate::vars::utf8(&process_mgr.globals.FM_CLIENT_DIR)
);
std::env::set_var("FM_MINT_CLIENT", fm_mint_client);
};
if let Some(oldest_fedimint_cli) = paths.first() {
set_fedimint_cli_path(oldest_fedimint_cli);
} else {
bail!("Must provide at least 1 binary path");
}
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
info!(
"running first stress test for fedimint-cli version: {}",
fedimint_cli_version
);
let dev_fed = dev_fed(process_mgr).await?;
let wait_session_client = dev_fed.fed.new_joined_client("wait-session-client").await?;
let reusable_upgrade_clients = UpgradeClients {
reissue_client: dev_fed.fed.new_joined_client("reissue-client").await?,
ln_send_client: dev_fed.fed.new_joined_client("ln-send-client").await?,
ln_receive_client: dev_fed.fed.new_joined_client("ln-receive-client").await?,
fm_pay_client: dev_fed.fed.new_joined_client("fm-pay-client").await?,
};
try_join!(
stress_test_fed(&dev_fed, Some(&reusable_upgrade_clients)),
wait_session_client.wait_session()
)?;
for path in paths.iter().skip(1) {
set_fedimint_cli_path(path);
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
info!("upgraded fedimint-cli to version: {}", fedimint_cli_version);
try_join!(
stress_test_fed(&dev_fed, Some(&reusable_upgrade_clients)),
wait_session_client.wait_session()
)?;
info!(
"### fedimint-cli passed stress test for version {}",
fedimint_cli_version
);
}
info!("## fedimint-cli upgraded all binaries successfully");
}
UpgradeTest::Gatewayd {
gatewayd_paths,
gateway_cli_paths,
} => {
if let Some(oldest_gatewayd) = gatewayd_paths.first() {
std::env::set_var("FM_GATEWAYD_BASE_EXECUTABLE", oldest_gatewayd);
} else {
bail!("Must provide at least 1 gatewayd path");
}
if let Some(oldest_gateway_cli) = gateway_cli_paths.first() {
std::env::set_var("FM_GATEWAY_CLI_BASE_EXECUTABLE", oldest_gateway_cli);
} else {
bail!("Must provide at least 1 gateway-cli path");
}
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
let gateway_cli_version = crate::util::GatewayCli::version_or_default().await;
info!(
?gatewayd_version,
?gateway_cli_version,
"running first stress test for gateway",
);
let mut dev_fed = dev_fed(process_mgr).await?;
let client = dev_fed.fed.new_joined_client("test-client").await?;
try_join!(stress_test_fed(&dev_fed, None), client.wait_session())?;
for i in 1..gatewayd_paths.len() {
info!(
"running stress test with gatewayd path {:?}",
gatewayd_paths.get(i)
);
let new_gatewayd_path = gatewayd_paths.get(i).expect("Not enough gatewayd paths");
let new_gateway_cli_path = gateway_cli_paths
.get(i)
.expect("Not enough gateway-cli paths");
let gateways = if let Some(gw_ldk) = &mut dev_fed.gw_ldk {
vec![&mut dev_fed.gw_lnd, gw_ldk]
} else {
vec![&mut dev_fed.gw_lnd]
};
try_join_all(gateways.into_iter().map(|gateway| {
gateway.restart_with_bin(process_mgr, new_gatewayd_path, new_gateway_cli_path)
}))
.await?;
try_join!(stress_test_fed(&dev_fed, None), client.wait_session())?;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
let gateway_cli_version = crate::util::GatewayCli::version_or_default().await;
info!(
?gatewayd_version,
?gateway_cli_version,
"### gateway passed stress test for version",
);
}
info!("## gatewayd upgraded all binaries successfully");
}
}
Ok(())
}
pub async fn cli_tests(dev_fed: DevFed) -> Result<()> {
log_binary_versions().await?;
let data_dir = env::var(FM_DATA_DIR_ENV)?;
let DevFed {
bitcoind,
cln,
lnd,
fed,
gw_lnd,
..
} = dev_fed;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
let fedimintd_version = crate::util::FedimintdCmd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0 || gatewayd_version < *VERSION_0_3_0 {
info!("fedmint-cli version that didn't support unknown modules");
return Ok(());
}
let client = fed.new_joined_client("cli-tests-client").await?;
client.use_gateway(&gw_lnd).await?;
let lnd_gw_id = gw_lnd.gateway_id().await?;
cmd!(
client,
"dev",
"config-decrypt",
"--in-file={data_dir}/fedimintd-default-0/private.encrypt",
"--out-file={data_dir}/fedimintd-default-0/config-plaintext.json"
)
.env(FM_PASSWORD_ENV, "pass")
.run()
.await?;
cmd!(
client,
"dev",
"config-encrypt",
"--in-file={data_dir}/fedimintd-default-0/config-plaintext.json",
"--out-file={data_dir}/fedimintd-default-0/config-2"
)
.env(FM_PASSWORD_ENV, "pass-foo")
.run()
.await?;
cmd!(
client,
"dev",
"config-decrypt",
"--in-file={data_dir}/fedimintd-default-0/config-2",
"--out-file={data_dir}/fedimintd-default-0/config-plaintext-2.json"
)
.env(FM_PASSWORD_ENV, "pass-foo")
.run()
.await?;
let plaintext_one = fs::read_to_string(format!(
"{data_dir}/fedimintd-default-0/config-plaintext.json"
))
.await?;
let plaintext_two = fs::read_to_string(format!(
"{data_dir}/fedimintd-default-0/config-plaintext-2.json"
))
.await?;
anyhow::ensure!(
plaintext_one == plaintext_two,
"config-decrypt/encrypt failed"
);
fed.pegin_gateways(10_000_000, vec![&gw_lnd]).await?;
let fed_id = fed.calculate_federation_id();
let invite = fed.invite_code()?;
gw_lnd
.set_federation_routing_fee(fed_id.clone(), 0, 0)
.await?;
cmd!(client, "list-gateways").run().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let invite_code = if fedimint_cli_version >= *VERSION_0_3_0_ALPHA {
cmd!(client, "dev", "decode", "invite-code", invite.clone())
} else {
cmd!(client, "dev", "decode-invite-code", invite.clone())
}
.out_json()
.await?;
let encode_invite_output = if fedimint_cli_version >= *VERSION_0_3_0_ALPHA {
cmd!(
client,
"dev",
"encode",
"invite-code",
format!("--url={}", invite_code["url"].as_str().unwrap()),
"--federation_id={fed_id}",
"--peer=0"
)
} else {
cmd!(
client,
"dev",
"encode-invite-code",
format!("--url={}", invite_code["url"].as_str().unwrap()),
"--federation_id={fed_id}",
"--peer=0"
)
}
.out_json()
.await?;
anyhow::ensure!(
encode_invite_output["invite_code"]
.as_str()
.expect("invite_code must be a string")
== invite,
"failed to decode and encode the client invite code",
);
info!("Testing LND can pay CLN directly");
let invoice = cln
.invoice(1_200_000, "test".to_string(), "test2".to_string())
.await?;
lnd.pay_bolt11_invoice(invoice).await?;
cln.wait_any_bolt11_invoice().await?;
info!("Testing CLN can pay LND directly");
let (invoice, payment_hash) = lnd.invoice(1_000_000).await?;
cln.pay_bolt11_invoice(invoice).await?;
lnd.wait_bolt11_invoice(payment_hash).await?;
if fedimintd_version >= *VERSION_0_3_0_ALPHA {
let config = cmd!(client, "config").out_json().await?;
let guardian_count = config["global"]["api_endpoints"].as_object().unwrap().len();
let descriptor = config["modules"]["2"]["peg_in_descriptor"]
.as_str()
.unwrap()
.to_owned();
info!("Testing generated descriptor for {guardian_count} guardian federation");
if guardian_count == 1 {
assert!(descriptor.contains("wpkh("));
} else {
assert!(descriptor.contains("wsh(sortedmulti("));
}
}
info!("Testing Client");
info!("Testing reissuing e-cash");
const CLIENT_START_AMOUNT: u64 = 5_000_000_000;
const CLIENT_SPEND_AMOUNT: u64 = 1_100_000;
let initial_client_balance = client.balance().await?;
assert_eq!(initial_client_balance, 0);
fed.pegin_client(CLIENT_START_AMOUNT / 1000, &client)
.await?;
if *VERSION_0_3_0_ALPHA <= fedimintd_version && *VERSION_0_3_0_ALPHA <= fedimint_cli_version {
info!("Testing backup&restore");
cli_tests_backup_and_restore(&fed, &client).await?;
} else {
info!(
"Skipping backup&restore test, because it was waaay too slow on old Fedimint versions"
);
}
info!("Testing spending from client");
let notes = cmd!(client, "spend", CLIENT_SPEND_AMOUNT)
.out_json()
.await?
.get("notes")
.expect("Output didn't contain e-cash notes")
.as_str()
.unwrap()
.to_owned();
let client_post_spend_balance = client.balance().await?;
assert_eq!(
client_post_spend_balance,
CLIENT_START_AMOUNT - CLIENT_SPEND_AMOUNT
);
cmd!(client, "reissue", notes).out_json().await?;
let client_post_spend_balance = client.balance().await?;
assert_eq!(client_post_spend_balance, CLIENT_START_AMOUNT);
let reissue_amount: u64 = 409_600;
info!("Testing reissuing e-cash after spending");
let _notes = cmd!(client, "spend", CLIENT_SPEND_AMOUNT)
.out_json()
.await?
.as_object()
.unwrap()
.get("notes")
.expect("Output didn't contain e-cash notes")
.as_str()
.unwrap();
let reissue_notes = cmd!(client, "spend", reissue_amount).out_json().await?["notes"]
.as_str()
.map(ToOwned::to_owned)
.unwrap();
let client_reissue_amt = cmd!(client, "reissue", reissue_notes)
.out_json()
.await?
.as_u64()
.unwrap();
assert_eq!(client_reissue_amt, reissue_amount);
info!("Testing reissuing e-cash via module commands");
let reissue_notes = cmd!(client, "spend", reissue_amount).out_json().await?["notes"]
.as_str()
.map(ToOwned::to_owned)
.unwrap();
let client_reissue_amt = if fedimint_cli_version >= *VERSION_0_3_0_ALPHA {
cmd!(client, "module", "mint", "reissue", reissue_notes)
} else {
cmd!(
client,
"module",
"--module",
"mint",
"reissue",
reissue_notes
)
}
.out_json()
.await?
.as_u64()
.unwrap();
assert_eq!(client_reissue_amt, reissue_amount);
info!("Testing LND gateway");
client.use_gateway(&gw_lnd).await?;
info!("Testing outgoing payment from client to CLN via LND gateway");
let initial_lnd_gateway_balance = gw_lnd.ecash_balance(fed_id.clone()).await?;
let invoice = cln
.invoice(
2_000_000,
"lnd-gw-to-cln".to_string(),
"test-client".to_string(),
)
.await?;
ln_pay(&client, invoice.clone(), lnd_gw_id.clone(), false).await?;
let fed_id = fed.calculate_federation_id();
cln.wait_any_bolt11_invoice().await?;
let final_lnd_outgoing_client_balance = client.balance().await?;
let final_lnd_outgoing_gateway_balance = gw_lnd.ecash_balance(fed_id.clone()).await?;
anyhow::ensure!(
final_lnd_outgoing_gateway_balance - initial_lnd_gateway_balance == 2_000_000,
"LND Gateway balance changed by {} on LND outgoing payment, expected 2_000_000",
(final_lnd_outgoing_gateway_balance - initial_lnd_gateway_balance)
);
info!("Testing incoming payment from CLN to client via LND gateway");
let recv = ln_invoice(
&client,
Amount::from_msats(1_300_000),
"incoming-over-lnd-gw".to_string(),
lnd_gw_id,
)
.await?;
let invoice = recv.invoice;
cln.pay_bolt11_invoice(invoice).await?;
info!("Testing receiving ecash notes");
let operation_id = recv.operation_id;
cmd!(client, "await-invoice", operation_id.fmt_full())
.run()
.await?;
let final_lnd_incoming_client_balance = client.balance().await?;
let final_lnd_incoming_gateway_balance = gw_lnd.ecash_balance(fed_id.clone()).await?;
anyhow::ensure!(
final_lnd_incoming_client_balance - final_lnd_outgoing_client_balance == 1_300_000,
"Client balance changed by {} on LND incoming payment, expected 1_300_000",
(final_lnd_incoming_client_balance - final_lnd_outgoing_client_balance)
);
anyhow::ensure!(
final_lnd_outgoing_gateway_balance - final_lnd_incoming_gateway_balance == 1_300_000,
"LND Gateway balance changed by {} on LND incoming payment, expected 1_300_000",
(final_lnd_outgoing_gateway_balance - final_lnd_incoming_gateway_balance)
);
info!("Testing client deposit");
let initial_walletng_balance = client.balance().await?;
fed.pegin_client(100_000, &client).await?; let post_deposit_walletng_balance = client.balance().await?;
assert_eq!(
post_deposit_walletng_balance,
initial_walletng_balance + 100_000_000 );
info!("Testing client withdraw");
let initial_walletng_balance = client.balance().await?;
let address = bitcoind.get_new_address().await?;
let withdraw_res = cmd!(
client,
"withdraw",
"--address",
&address,
"--amount",
"50000 sat"
)
.out_json()
.await?;
let txid: Txid = withdraw_res["txid"].as_str().unwrap().parse().unwrap();
let fees_sat = withdraw_res["fees_sat"].as_u64().unwrap();
let tx_hex = bitcoind.poll_get_transaction(txid).await?;
let tx = bitcoin::Transaction::consensus_decode_hex(&tx_hex, &ModuleRegistry::default())?;
assert!(tx
.output
.iter()
.any(|o| o.script_pubkey == address.script_pubkey() && o.value.to_sat() == 50000));
let post_withdraw_walletng_balance = client.balance().await?;
let expected_wallet_balance = initial_walletng_balance - 50_000_000 - (fees_sat * 1000);
assert_eq!(post_withdraw_walletng_balance, expected_wallet_balance);
if fedimintd_version >= *VERSION_0_5_0_ALPHA && fedimint_cli_version >= *VERSION_0_5_0_ALPHA {
let peer_0_fedimintd_version = cmd!(client, "dev", "peer-version", "--peer-id", "0")
.out_json()
.await?
.get("version")
.expect("Output didn't contain version")
.as_str()
.unwrap()
.to_owned();
assert_eq!(
semver::Version::parse(&peer_0_fedimintd_version)?,
fedimintd_version
);
}
if fedimint_cli_version >= *VERSION_0_4_0_ALPHA && fedimintd_version >= *VERSION_0_4_0_ALPHA {
let initial_announcements =
serde_json::from_value::<BTreeMap<PeerId, SignedApiAnnouncement>>(
cmd!(client, "dev", "api-announcements",).out_json().await?,
)
.expect("failed to parse API announcements");
assert_eq!(
fed.members.len(),
initial_announcements.len(),
"Not all guardians made an announcement"
);
assert!(
initial_announcements
.values()
.all(|announcement| announcement.api_announcement.nonce == 0),
"Not all announcements have their initial value"
);
const NEW_API_URL: &str = "ws://127.0.0.1:4242";
let new_announcement = serde_json::from_value::<SignedApiAnnouncement>(
cmd!(
client,
"--our-id",
"0",
"--password",
"pass",
"admin",
"sign-api-announcement",
NEW_API_URL
)
.out_json()
.await?,
)
.expect("Couldn't parse signed announcement");
assert_eq!(
new_announcement.api_announcement.nonce, 1,
"Nonce did not increment correctly"
);
info!("Testing if the client syncs the announcement");
let announcement = poll("Waiting for the announcement to propagate", || async {
cmd!(client, "dev", "wait", "1")
.run()
.await
.map_err(ControlFlow::Break)?;
let new_announcements_peer2 =
serde_json::from_value::<BTreeMap<PeerId, SignedApiAnnouncement>>(
cmd!(client, "dev", "api-announcements",)
.out_json()
.await
.map_err(ControlFlow::Break)?,
)
.expect("failed to parse API announcements");
let announcement = new_announcements_peer2[&PeerId::from(0)]
.api_announcement
.clone();
if announcement.nonce == 1 {
Ok(announcement)
} else {
Err(ControlFlow::Continue(anyhow!(
"Haven't received updated announcement yet"
)))
}
})
.await?;
assert_eq!(
announcement.api_url,
NEW_API_URL.parse().expect("valid URL")
);
}
Ok(())
}
pub async fn start_hold_invoice_payment(
client: &Client,
gw_cln: &Gatewayd,
gw_cln_id: String,
lnd: &Lnd,
) -> anyhow::Result<([u8; 32], cln_rpc::primitives::Sha256, String)> {
client.use_gateway(gw_cln).await?;
let (preimage, payment_request, hash) = lnd.create_hold_invoice(1000).await?;
let operation_id = ln_pay(client, payment_request, gw_cln_id, true).await?;
Ok((preimage, hash, operation_id))
}
pub async fn finish_hold_invoice_payment(
client: &Client,
hold_invoice_operation_id: String,
lnd: &Lnd,
hold_invoice_hash: cln_rpc::primitives::Sha256,
hold_invoice_preimage: [u8; 32],
) -> anyhow::Result<()> {
lnd.settle_hold_invoice(hold_invoice_preimage, hold_invoice_hash)
.await?;
let received_preimage = cmd!(client, "await-ln-pay", hold_invoice_operation_id)
.out_json()
.await?["preimage"]
.as_str()
.context("missing preimage")?
.to_owned();
assert_eq!(
received_preimage,
hold_invoice_preimage.encode_hex::<String>()
);
Ok(())
}
pub async fn cli_load_test_tool_test(dev_fed: DevFed) -> Result<()> {
log_binary_versions().await?;
let data_dir = env::var(FM_DATA_DIR_ENV)?;
let load_test_temp = PathBuf::from(data_dir).join("load-test-temp");
dev_fed
.fed
.pegin_client(10_000, dev_fed.fed.internal_client().await?)
.await?;
let invite_code = dev_fed.fed.invite_code()?;
dev_fed
.gw_lnd
.set_federation_routing_fee(dev_fed.fed.calculate_federation_id(), 0, 0)
.await?;
run_standard_load_test(&load_test_temp, &invite_code).await?;
run_ln_circular_load_test(&load_test_temp, &invite_code).await?;
Ok(())
}
pub async fn run_standard_load_test(
load_test_temp: &Path,
invite_code: &str,
) -> anyhow::Result<()> {
let output = cmd!(
LoadTestTool,
"--archive-dir",
load_test_temp.display(),
"--users",
"1",
"load-test",
"--notes-per-user",
"1",
"--generate-invoice-with",
"cln-lightning-cli",
"--invite-code",
invite_code
)
.out_string()
.await?;
println!("{output}");
anyhow::ensure!(
output.contains("2 reissue_notes"),
"reissued different number notes than expected"
);
anyhow::ensure!(
output.contains("1 gateway_pay_invoice"),
"paid different number of invoices than expected"
);
Ok(())
}
pub async fn run_ln_circular_load_test(
load_test_temp: &Path,
invite_code: &str,
) -> anyhow::Result<()> {
info!("Testing ln-circular-load-test with 'two-gateways' strategy");
let output = cmd!(
LoadTestTool,
"--archive-dir",
load_test_temp.display(),
"--users",
"1",
"ln-circular-load-test",
"--strategy",
"two-gateways",
"--test-duration-secs",
"2",
"--invite-code",
invite_code
)
.out_string()
.await?;
println!("{output}");
anyhow::ensure!(
output.contains("gateway_create_invoice"),
"missing invoice creation"
);
anyhow::ensure!(
output.contains("gateway_pay_invoice_success"),
"missing invoice payment"
);
anyhow::ensure!(
output.contains("gateway_payment_received_success"),
"missing received payment"
);
info!("Testing ln-circular-load-test with 'partner-ping-pong' strategy");
let output = cmd!(
LoadTestTool,
"--archive-dir",
load_test_temp.display(),
"--users",
"1",
"ln-circular-load-test",
"--strategy",
"partner-ping-pong",
"--test-duration-secs",
"6",
"--invite-code",
invite_code
)
.out_string()
.await?;
println!("{output}");
anyhow::ensure!(
output.contains("gateway_create_invoice"),
"missing invoice creation"
);
anyhow::ensure!(
output.contains("gateway_payment_received_success"),
"missing received payment"
);
info!("Testing ln-circular-load-test with 'self-payment' strategy");
let output = cmd!(
LoadTestTool,
"--archive-dir",
load_test_temp.display(),
"--users",
"1",
"ln-circular-load-test",
"--strategy",
"self-payment",
"--test-duration-secs",
"2",
"--invite-code",
invite_code
)
.out_string()
.await?;
println!("{output}");
anyhow::ensure!(
output.contains("gateway_create_invoice"),
"missing invoice creation"
);
anyhow::ensure!(
output.contains("gateway_payment_received_success"),
"missing received payment"
);
Ok(())
}
pub async fn cli_tests_backup_and_restore(
fed: &Federation,
reference_client: &Client,
) -> Result<()> {
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let secret = cmd!(reference_client, "print-secret").out_json().await?["secret"]
.as_str()
.map(ToOwned::to_owned)
.unwrap();
let pre_notes = cmd!(reference_client, "info").out_json().await?;
let pre_balance = pre_notes["total_amount_msat"].as_u64().unwrap();
debug!(target: LOG_DEVIMINT, %pre_notes, pre_balance, "State before backup");
assert!(0 < pre_balance);
{
let post_balance = if fedimint_cli_version >= *VERSION_0_3_0_ALPHA {
let client = Client::create("restore-without-backup").await?;
let _ = cmd!(
client,
"restore",
"--mnemonic",
&secret,
"--invite-code",
fed.invite_code()?
)
.out_json()
.await?;
let _ = cmd!(client, "dev", "wait-complete").out_json().await?;
let post_notes = cmd!(client, "info").out_json().await?;
let post_balance = post_notes["total_amount_msat"].as_u64().unwrap();
debug!(target: LOG_DEVIMINT, %post_notes, post_balance, "State after backup");
post_balance
} else {
let client = reference_client
.new_forked("restore-without-backup")
.await?;
let _ = cmd!(client, "wipe", "--force",).out_json().await?;
assert_eq!(
0,
cmd!(client, "info").out_json().await?["total_amount_msat"]
.as_u64()
.unwrap()
);
let post_balance = cmd!(client, "restore", &secret,)
.out_json()
.await?
.as_u64()
.unwrap();
let post_notes = cmd!(client, "info").out_json().await?;
debug!(target: LOG_DEVIMINT, %post_notes, post_balance, "State after backup");
post_balance
};
assert_eq!(pre_balance, post_balance);
}
{
if fedimint_cli_version >= *VERSION_0_3_0_ALPHA {
let _ = cmd!(reference_client, "backup",).out_json().await?;
let client = Client::create("restore-with-backup").await?;
{
let _ = cmd!(
client,
"restore",
"--mnemonic",
&secret,
"--invite-code",
fed.invite_code()?
)
.out_json()
.await?;
let _ = cmd!(client, "dev", "wait-complete").out_json().await?;
let post_notes = cmd!(client, "info").out_json().await?;
let post_balance = post_notes["total_amount_msat"].as_u64().unwrap();
debug!(%post_notes, post_balance, "State after backup");
assert_eq!(pre_balance, post_balance);
}
let _ = cmd!(client, "backup",).out_json().await?;
const EXTRA_PEGIN_SATS: u64 = 1000;
fed.pegin_client(EXTRA_PEGIN_SATS, &client).await?;
{
let client = Client::create("restore-with-backup-again").await?;
let _ = cmd!(
client,
"restore",
"--mnemonic",
&secret,
"--invite-code",
fed.invite_code()?
)
.out_json()
.await?;
let _ = cmd!(client, "dev", "wait-complete").out_json().await?;
let post_notes = cmd!(client, "info").out_json().await?;
let post_balance = post_notes["total_amount_msat"].as_u64().unwrap();
debug!(target: LOG_DEVIMINT, %post_notes, post_balance, "State after (subsequent) backup");
assert_eq!(pre_balance + EXTRA_PEGIN_SATS * 1000, post_balance);
}
} else {
let client = reference_client.new_forked("restore-with-backup").await?;
let _ = cmd!(client, "backup",).out_json().await?;
let _ = cmd!(client, "wipe", "--force",).out_json().await?;
assert_eq!(
0,
cmd!(client, "info").out_json().await?["total_amount_msat"]
.as_u64()
.unwrap()
);
let _ = cmd!(client, "restore", &secret,).out_json().await?;
let post_notes = cmd!(client, "info").out_json().await?;
let post_balance = post_notes["total_amount_msat"].as_u64().unwrap();
debug!(target: LOG_DEVIMINT, %post_notes, post_balance, "State after backup");
assert_eq!(pre_balance, post_balance);
}
}
Ok(())
}
pub async fn lightning_gw_reconnect_test(
dev_fed: DevFed,
process_mgr: &ProcessManager,
) -> Result<()> {
log_binary_versions().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0 || gatewayd_version < *VERSION_0_3_0 {
info!("fedmint-cli version that didn't support unknown modules");
return Ok(());
}
let DevFed {
bitcoind,
cln,
lnd,
fed,
mut gw_lnd,
..
} = dev_fed;
let client = fed
.new_joined_client("lightning-gw-reconnect-test-client")
.await?;
client.use_gateway(&gw_lnd).await?;
info!("Pegging-in both gateways");
fed.pegin_gateways(99_999, vec![&gw_lnd]).await?;
drop(lnd);
tracing::info!("Stopping LND");
let mut info_cmd = cmd!(gw_lnd, "info");
assert!(info_cmd.run().await.is_ok());
gw_lnd.stop_lightning_node().await?;
let lightning_info = info_cmd.out_json().await?;
let lightning_pub_key: Option<String> =
serde_json::from_value(lightning_info["lightning_pub_key"].clone())?;
assert!(lightning_pub_key.is_none());
tracing::info!("Restarting LND...");
let new_lnd = Lnd::new(process_mgr, bitcoind.clone()).await?;
gw_lnd.set_lightning_node(LightningNode::Lnd(new_lnd.clone()));
tracing::info!("Retrying info...");
const MAX_RETRIES: usize = 30;
const RETRY_INTERVAL: Duration = Duration::from_secs(1);
for i in 0..MAX_RETRIES {
match do_try_create_and_pay_invoice(&gw_lnd, &client, &cln).await {
Ok(()) => break,
Err(e) => {
if i == MAX_RETRIES - 1 {
return Err(e);
}
tracing::debug!(
"Pay invoice for gateway {} failed with {e:?}, retrying in {} seconds (try {}/{MAX_RETRIES})",
gw_lnd.ln
.as_ref()
.map(|ln| ln.name().to_string())
.unwrap_or_default(),
RETRY_INTERVAL.as_secs(),
i + 1,
);
fedimint_core::task::sleep_in_test(
"paying invoice for gateway failed",
RETRY_INTERVAL,
)
.await;
}
}
}
info!(target: LOG_DEVIMINT, "lightning_reconnect_test: success");
Ok(())
}
pub async fn gw_reboot_test(dev_fed: DevFed, process_mgr: &ProcessManager) -> Result<()> {
log_binary_versions().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0 || gatewayd_version < *VERSION_0_3_0 {
info!("fedmint-cli version that didn't support unknown modules");
return Ok(());
}
let DevFed {
bitcoind,
cln,
lnd,
fed,
gw_lnd,
gw_ldk,
..
} = dev_fed;
let client = fed.new_joined_client("gw-reboot-test-client").await?;
client.use_gateway(&gw_lnd).await?;
fed.pegin_client(10_000, &client).await?;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
if gatewayd_version >= *VERSION_0_4_0 {
let block_height = bitcoind.get_block_count().await? - 1;
if let Some(gw_ldk) = &gw_ldk {
try_join!(
gw_lnd.wait_for_block_height(block_height),
gw_ldk.wait_for_block_height(block_height),
)?;
} else {
try_join!(gw_lnd.wait_for_block_height(block_height),)?;
}
}
let (lnd_value, ldk_value_or) = if let Some(gw_ldk) = &gw_ldk {
let (lnd_value, ldk_value) = try_join!(gw_lnd.get_info(), gw_ldk.get_info())?;
(lnd_value, Some(ldk_value))
} else {
let lnd_value = gw_lnd.get_info().await?;
(lnd_value, None)
};
let lnd_gateway_id = gw_lnd.gateway_id().await?;
drop(gw_lnd);
if let Some(gw_ldk) = gw_ldk {
drop(gw_ldk);
}
info!("Making payment while gateway is down");
let initial_client_balance = client.balance().await?;
let invoice = cln
.invoice(
3000,
"down-payment".to_string(),
"down-payment-label".to_string(),
)
.await?;
ln_pay(&client, invoice, lnd_gateway_id, false)
.await
.expect_err("Expected ln-pay to return error because the gateway is not online");
let new_client_balance = client.balance().await?;
anyhow::ensure!(initial_client_balance == new_client_balance);
info!("Rebooting gateways...");
let (new_gw_lnd, new_gw_ldk_or) = if ldk_value_or.is_some() {
let (new_gw_lnd, new_gw_ldk) = try_join!(
Gatewayd::new(process_mgr, LightningNode::Lnd(lnd.clone())),
Gatewayd::new(process_mgr, LightningNode::Ldk)
)?;
(new_gw_lnd, Some(new_gw_ldk))
} else {
let new_gw_lnd = Gatewayd::new(process_mgr, LightningNode::Lnd(lnd.clone())).await?;
(new_gw_lnd, None)
};
let lnd_gateway_id: fedimint_core::secp256k1::PublicKey =
serde_json::from_value(lnd_value["gateway_id"].clone())?;
poll(
"Waiting for LND Gateway Running state after reboot",
|| async {
let mut new_lnd_cmd = cmd!(new_gw_lnd, "info");
let lnd_value = new_lnd_cmd.out_json().await.map_err(ControlFlow::Continue)?;
let reboot_gateway_state: String = serde_json::from_value(lnd_value["gateway_state"].clone()).context("invalid gateway state").map_err(ControlFlow::Break)?;
let reboot_gateway_id: fedimint_core::secp256k1::PublicKey =
serde_json::from_value(lnd_value["gateway_id"].clone()).context("invalid gateway id").map_err(ControlFlow::Break)?;
if reboot_gateway_state == "Running" {
info!(target: LOG_DEVIMINT, "LND Gateway restarted, with auto-rejoin to federation");
assert_eq!(lnd_gateway_id, reboot_gateway_id);
return Ok(());
}
Err(ControlFlow::Continue(anyhow!("gateway not running")))
},
)
.await?;
if let (Some(new_gw_ldk), Some(ldk_value)) = (new_gw_ldk_or, ldk_value_or) {
let ldk_info: GatewayInfo = serde_json::from_value(ldk_value)?;
poll(
"Waiting for LDK Gateway Running state after reboot",
|| async {
let mut new_ldk_cmd = cmd!(new_gw_ldk, "info");
let ldk_value = new_ldk_cmd.out_json().await.map_err(ControlFlow::Continue)?;
let reboot_info: GatewayInfo = serde_json::from_value(ldk_value).context("json invalid").map_err(ControlFlow::Break)?;
if reboot_info.gateway_state == "Running" {
info!(target: LOG_DEVIMINT, "LDK Gateway restarted, with auto-rejoin to federation");
assert_eq!(ldk_info, reboot_info);
return Ok(());
}
Err(ControlFlow::Continue(anyhow!("gateway not running")))
},
)
.await?;
}
info!(LOG_DEVIMINT, "gateway_reboot_test: success");
Ok(())
}
pub async fn do_try_create_and_pay_invoice(
gw: &Gatewayd,
client: &Client,
cln: &Lightningd,
) -> anyhow::Result<()> {
poll("Waiting for info to succeed after restart", || async {
let lightning_pub_key = cmd!(gw, "info")
.out_json()
.await
.map_err(ControlFlow::Continue)?
.get("lightning_pub_key")
.map(|ln_pk| {
serde_json::from_value::<Option<String>>(ln_pk.clone())
.expect("could not parse lightning_pub_key")
})
.expect("missing lightning_pub_key");
poll_eq!(lightning_pub_key.is_some(), true)
})
.await?;
tracing::info!("Creating invoice....");
client.use_gateway(gw).await?;
let invoice = ln_invoice(
client,
Amount::from_msats(1000),
"incoming-over-cln-gw".to_string(),
gw.gateway_id().await?,
)
.await?
.invoice;
match gw.ln.as_ref() {
Some(LightningNode::Lnd(_lnd)) => {
cln.pay_bolt11_invoice(invoice).await?;
}
Some(LightningNode::Ldk) => {
unimplemented!("do_try_create_and_pay_invoice not implemented for LDK yet");
}
None => {
panic!("Lightning node did not come back up correctly");
}
}
Ok(())
}
async fn ln_pay(
client: &Client,
invoice: String,
gw_id: String,
finish_in_background: bool,
) -> anyhow::Result<String> {
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let value = if fedimint_cli_version < *VERSION_0_3_0_ALPHA {
if finish_in_background {
cmd!(client, "ln-pay", invoice, "--finish-in-background",)
.out_json()
.await?
} else {
cmd!(client, "ln-pay", invoice,).out_json().await?
}
} else if finish_in_background {
cmd!(
client,
"ln-pay",
invoice,
"--finish-in-background",
"--gateway-id",
gw_id,
)
.out_json()
.await?
} else {
cmd!(client, "ln-pay", invoice, "--gateway-id", gw_id,)
.out_json()
.await?
};
let operation_id = value["operation_id"]
.as_str()
.ok_or(anyhow!("Failed to pay invoice"))?
.to_string();
Ok(operation_id)
}
async fn ln_invoice(
client: &Client,
amount: Amount,
description: String,
gw_id: String,
) -> anyhow::Result<LnInvoiceResponse> {
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let ln_response_val = if fedimint_cli_version < *VERSION_0_3_0_ALPHA {
cmd!(
client,
"ln-invoice",
"--amount",
amount.msats,
format!("--description='{description}'"),
)
.out_json()
.await?
} else {
cmd!(
client,
"ln-invoice",
"--amount",
amount.msats,
format!("--description='{description}'"),
"--gateway-id",
gw_id,
)
.out_json()
.await?
};
let ln_invoice_response: LnInvoiceResponse = serde_json::from_value(ln_response_val)?;
Ok(ln_invoice_response)
}
pub async fn reconnect_test(dev_fed: DevFed, process_mgr: &ProcessManager) -> Result<()> {
log_binary_versions().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0 || gatewayd_version < *VERSION_0_3_0 {
info!("fedmint-cli version that didn't support unknown modules");
return Ok(());
}
let DevFed {
bitcoind, mut fed, ..
} = dev_fed;
bitcoind.mine_blocks(110).await?;
fed.await_block_sync().await?;
fed.await_all_peers().await?;
fed.terminate_server(0).await?;
fed.mine_then_wait_blocks_sync(100).await?;
fed.start_server(process_mgr, 0).await?;
fed.mine_then_wait_blocks_sync(100).await?;
fed.await_all_peers().await?;
info!(target: LOG_DEVIMINT, "Server 0 successfully rejoined!");
fed.mine_then_wait_blocks_sync(100).await?;
fed.terminate_server(1).await?;
fed.mine_then_wait_blocks_sync(100).await?;
fed.terminate_server(2).await?;
fed.terminate_server(3).await?;
fed.start_server(process_mgr, 1).await?;
fed.start_server(process_mgr, 2).await?;
fed.start_server(process_mgr, 3).await?;
fed.await_all_peers().await?;
info!(target: LOG_DEVIMINT, "fm success: reconnect-test");
Ok(())
}
pub async fn recoverytool_test(dev_fed: DevFed) -> Result<()> {
log_binary_versions().await?;
let fedimintd_version = crate::util::FedimintdCmd::version_or_default().await;
if fedimintd_version < *VERSION_0_4_0_ALPHA {
info!("Recoverytool tests in fedmintd version that didn't have short session times when running in tests");
return Ok(());
}
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let gatewayd_version = crate::util::Gatewayd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0 || gatewayd_version < *VERSION_0_3_0 {
info!("fedmint-cli version that didn't support unknown modules");
return Ok(());
}
let DevFed { bitcoind, fed, .. } = dev_fed;
let data_dir = env::var(FM_DATA_DIR_ENV)?;
let client = fed.new_joined_client("recoverytool-test-client").await?;
let mut fed_utxos_sats = HashSet::from([12_345_000, 23_456_000, 34_567_000]);
let deposit_fees = fed.deposit_fees()?.msats / 1000;
for sats in &fed_utxos_sats {
fed.pegin_client(*sats - deposit_fees, &client).await?;
}
async fn withdraw(
client: &Client,
bitcoind: &crate::external::Bitcoind,
fed_utxos_sats: &mut HashSet<u64>,
) -> Result<()> {
let withdrawal_address = bitcoind.get_new_address().await?;
let withdraw_res = cmd!(
client,
"withdraw",
"--address",
&withdrawal_address,
"--amount",
"5000 sat"
)
.out_json()
.await?;
let fees_sat = withdraw_res["fees_sat"]
.as_u64()
.expect("withdrawal should contain fees");
let txid: Txid = withdraw_res["txid"]
.as_str()
.expect("withdrawal should contain txid string")
.parse()
.expect("txid should be parsable");
let tx_hex = bitcoind.poll_get_transaction(txid).await?;
let tx = bitcoin::Transaction::consensus_decode_hex(&tx_hex, &ModuleRegistry::default())?;
assert_eq!(tx.input.len(), 1);
assert_eq!(tx.output.len(), 2);
let change_output = tx
.output
.iter()
.find(|o| o.to_owned().script_pubkey != withdrawal_address.script_pubkey())
.expect("withdrawal must have change output");
assert!(fed_utxos_sats.insert(change_output.value.to_sat()));
let total_output_sats = tx.output.iter().map(|o| o.value.to_sat()).sum::<u64>();
let input_sats = total_output_sats + fees_sat;
assert!(fed_utxos_sats.remove(&input_sats));
Ok(())
}
for _ in 0..2 {
withdraw(&client, &bitcoind, &mut fed_utxos_sats).await?;
}
let total_fed_sats = fed_utxos_sats.iter().sum::<u64>();
fed.finalize_mempool_tx().await?;
let last_tx_session = client.get_session_count().await?;
info!("Recovering using utxos method");
let output = cmd!(
crate::util::Recoverytool,
"--cfg",
"{data_dir}/fedimintd-default-0",
"utxos",
"--db",
"{data_dir}/fedimintd-default-0/database"
)
.env(FM_PASSWORD_ENV, "pass")
.out_json()
.await?;
let outputs = output.as_array().context("expected an array")?;
assert_eq!(outputs.len(), fed_utxos_sats.len());
assert_eq!(
outputs
.iter()
.map(|o| o["amount_sat"].as_u64().unwrap())
.collect::<HashSet<_>>(),
fed_utxos_sats
);
let utxos_descriptors = outputs
.iter()
.map(|o| o["descriptor"].as_str().unwrap())
.collect::<HashSet<_>>();
debug!(target: LOG_DEVIMINT, ?utxos_descriptors, "recoverytool descriptors using UTXOs method");
let descriptors_json = serde_json::value::to_raw_value(&serde_json::Value::Array(vec![
serde_json::Value::Array(
utxos_descriptors
.iter()
.map(|d| {
json!({
"desc": d,
"timestamp": 0,
})
})
.collect(),
),
]))?;
info!("Getting wallet balances before import");
let bitcoin_client = bitcoind.wallet_client().await?;
let balances_before = bitcoin_client.get_balances().await?;
info!("Importing descriptors into bitcoin wallet");
let request = bitcoin_client
.get_jsonrpc_client()
.build_request("importdescriptors", Some(&descriptors_json));
let response = block_in_place(|| bitcoin_client.get_jsonrpc_client().send_request(request))?;
response.check_error()?;
info!("Getting wallet balances after import");
let balances_after = bitcoin_client.get_balances().await?;
let diff = balances_after.mine.immature + balances_after.mine.trusted
- balances_before.mine.immature
- balances_before.mine.trusted;
client.wait_session_outcome(last_tx_session).await?;
assert_eq!(diff.to_sat(), total_fed_sats);
info!("Recovering using epochs method");
let outputs = cmd!(
crate::util::Recoverytool,
"--cfg",
"{data_dir}/fedimintd-default-0",
"epochs",
"--db",
"{data_dir}/fedimintd-default-0/database"
)
.env(FM_PASSWORD_ENV, "pass")
.out_json()
.await?
.as_array()
.context("expected an array")?
.clone();
let epochs_descriptors = outputs
.iter()
.map(|o| o["descriptor"].as_str().unwrap())
.collect::<HashSet<_>>();
debug!(target: LOG_DEVIMINT, ?epochs_descriptors, "recoverytool descriptors using epochs method");
for utxo_descriptor in utxos_descriptors {
assert!(epochs_descriptors.contains(utxo_descriptor));
}
Ok(())
}
pub async fn guardian_backup_test(dev_fed: DevFed, process_mgr: &ProcessManager) -> Result<()> {
const PEER_TO_TEST: u16 = 0;
log_binary_versions().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let fedimintd_version = crate::util::FedimintdCmd::version_or_default().await;
if fedimint_cli_version < *VERSION_0_3_0_ALPHA || fedimintd_version < *VERSION_0_3_0_ALPHA {
info!("Guardian backups didn't exist pre-0.3.0, so can't be tested, exiting");
return Ok(());
}
let DevFed { mut fed, .. } = dev_fed;
fed.await_all_peers()
.await
.expect("Awaiting federation coming online failed");
let client = fed.new_joined_client("guardian-client").await?;
let old_block_count = cmd!(
client,
"dev",
"api",
"--peer-id",
PEER_TO_TEST.to_string(),
"module_{LEGACY_HARDCODED_INSTANCE_ID_WALLET}_block_count",
)
.out_json()
.await?["value"]
.as_u64()
.expect("No block height returned");
let backup_res = cmd!(
client,
"--our-id",
PEER_TO_TEST.to_string(),
"--password",
"pass",
"admin",
"guardian-config-backup"
)
.out_json()
.await?;
let backup_hex = backup_res["tar_archive_bytes"]
.as_str()
.expect("expected hex string");
let backup_tar = hex::decode(backup_hex).expect("invalid hex");
let data_dir = fed
.vars
.get(&PEER_TO_TEST.into())
.expect("peer not found")
.FM_DATA_DIR
.clone();
fed.terminate_server(PEER_TO_TEST.into())
.await
.expect("could not terminate fedimintd");
std::fs::remove_dir_all(&data_dir).expect("error deleting old datadir");
std::fs::create_dir(&data_dir).expect("error creating new datadir");
let write_file = |name: &str, data: &[u8]| {
let mut file = std::fs::File::options()
.write(true)
.create(true)
.truncate(true)
.open(data_dir.join(name))
.expect("could not open file");
file.write_all(data).expect("could not write file");
file.flush().expect("could not flush file");
};
write_file("backup.tar", &backup_tar);
write_file(
fedimint_server::config::io::PLAINTEXT_PASSWORD,
"pass".as_bytes(),
);
assert_eq!(
std::process::Command::new("tar")
.arg("-xf")
.arg("backup.tar")
.current_dir(data_dir)
.spawn()
.expect("error spawning tar")
.wait()
.expect("error extracting archive")
.code(),
Some(0),
"tar failed"
);
fed.start_server(process_mgr, PEER_TO_TEST.into())
.await
.expect("could not restart fedimintd");
poll("Peer catches up again", || async {
let block_counts = all_peer_block_count(&client, fed.member_ids())
.await
.map_err(ControlFlow::Continue)?;
let block_count = block_counts[&PeerId::from(PEER_TO_TEST)];
info!("Caught up to block {block_count} of at least {old_block_count} (counts={block_counts:?})");
if block_count < old_block_count {
return Err(ControlFlow::Continue(anyhow!("Block count still behind")));
}
Ok(())
})
.await
.expect("Peer didn't rejoin federation");
Ok(())
}
async fn peer_block_count(client: &Client, peer: PeerId) -> Result<u64> {
cmd!(
client,
"dev",
"api",
"--peer-id",
peer.to_string(),
"module_{LEGACY_HARDCODED_INSTANCE_ID_WALLET}_block_count",
)
.out_json()
.await?["value"]
.as_u64()
.context("No block height returned")
}
async fn all_peer_block_count(
client: &Client,
peers: impl Iterator<Item = PeerId>,
) -> Result<BTreeMap<PeerId, u64>> {
let mut peer_heights = BTreeMap::new();
for peer in peers {
peer_heights.insert(peer, peer_block_count(client, peer).await?);
}
Ok(peer_heights)
}
pub async fn cannot_replay_tx_test(dev_fed: DevFed) -> Result<()> {
log_binary_versions().await?;
let fedimint_cli_version = crate::util::FedimintCli::version_or_default().await;
let DevFed { fed, .. } = dev_fed;
let client = fed.new_joined_client("cannot-replay-client").await?;
const CLIENT_START_AMOUNT: u64 = 5_000_000_000;
const CLIENT_SPEND_AMOUNT: u64 = 5_000_000_000;
let initial_client_balance = client.balance().await?;
assert_eq!(initial_client_balance, 0);
fed.pegin_client(CLIENT_START_AMOUNT / 1000, &client)
.await?;
let double_spend_client = client.new_forked("double-spender").await?;
let notes = cmd!(client, "spend", CLIENT_SPEND_AMOUNT)
.out_json()
.await?
.get("notes")
.expect("Output didn't contain e-cash notes")
.as_str()
.unwrap()
.to_owned();
let client_post_spend_balance = client.balance().await?;
assert_eq!(
client_post_spend_balance,
CLIENT_START_AMOUNT - CLIENT_SPEND_AMOUNT
);
cmd!(client, "reissue", notes).out_json().await?;
let client_post_reissue_balance = client.balance().await?;
assert_eq!(client_post_reissue_balance, CLIENT_START_AMOUNT);
let double_spend_notes = cmd!(double_spend_client, "spend", CLIENT_SPEND_AMOUNT)
.out_json()
.await?
.get("notes")
.expect("Output didn't contain e-cash notes")
.as_str()
.unwrap()
.to_owned();
let double_spend_client_post_spend_balance = double_spend_client.balance().await?;
assert_eq!(
double_spend_client_post_spend_balance,
CLIENT_START_AMOUNT - CLIENT_SPEND_AMOUNT
);
if fedimint_cli_version >= *VERSION_0_3_0_ALPHA {
cmd!(double_spend_client, "reissue", double_spend_notes)
.assert_error_contains("The transaction had an invalid input")
.await?;
} else {
cmd!(double_spend_client, "reissue", double_spend_notes)
.run()
.await
.expect_err("double spend must fail");
}
let double_spend_client_post_spend_balance = double_spend_client.balance().await?;
assert_eq!(
double_spend_client_post_spend_balance,
CLIENT_START_AMOUNT - CLIENT_SPEND_AMOUNT
);
Ok(())
}
#[derive(Subcommand)]
pub enum LatencyTest {
Reissue,
LnSend,
LnReceive,
FmPay,
Restore,
}
#[derive(Subcommand)]
pub enum UpgradeTest {
Fedimintd {
#[arg(long, trailing_var_arg = true, num_args=1..)]
paths: Vec<PathBuf>,
},
FedimintCli {
#[arg(long, trailing_var_arg = true, num_args=1..)]
paths: Vec<PathBuf>,
},
Gatewayd {
#[arg(long, trailing_var_arg = true, num_args=1..)]
gatewayd_paths: Vec<PathBuf>,
#[arg(long, trailing_var_arg = true, num_args=1..)]
gateway_cli_paths: Vec<PathBuf>,
},
}
#[derive(Subcommand)]
pub enum TestCmd {
LatencyTests {
#[clap(subcommand)]
r#type: LatencyTest,
#[arg(long, default_value = "10")]
iterations: usize,
},
ReconnectTest,
CliTests,
LoadTestToolTest,
LightningReconnectTest,
GatewayRebootTest,
RecoverytoolTests,
WasmTestSetup {
#[arg(long, trailing_var_arg = true, allow_hyphen_values = true, num_args=1..)]
exec: Option<Vec<ffi::OsString>>,
},
GuardianBackup,
CannotReplayTransaction,
UpgradeTests {
#[clap(subcommand)]
binary: UpgradeTest,
},
}
pub async fn handle_command(cmd: TestCmd, common_args: CommonArgs) -> Result<()> {
match cmd {
TestCmd::WasmTestSetup { exec } => {
let (process_mgr, task_group) = setup(common_args).await?;
let main = {
let task_group = task_group.clone();
async move {
let dev_fed = dev_fed(&process_mgr).await?;
dev_fed
.gw_lnd
.set_federation_routing_fee(dev_fed.fed.calculate_federation_id(), 0, 0)
.await?;
let ((), faucet) = try_join!(
dev_fed.fed.pegin_gateways(20_000, vec![&dev_fed.gw_lnd]),
async {
let faucet = process_mgr
.spawn_daemon("devimint-faucet", cmd!(crate::util::Faucet))
.await?;
poll("waiting for faucet startup", || async {
TcpStream::connect(format!(
"127.0.0.1:{}",
process_mgr.globals.FM_PORT_FAUCET
))
.await
.context("connect to faucet")
.map_err(ControlFlow::Continue)
})
.await?;
Ok(faucet)
},
)?;
let daemons = write_ready_file(&process_mgr.globals, Ok(dev_fed)).await?;
if let Some(exec) = exec {
exec_user_command(exec).await?;
task_group.shutdown();
}
Ok::<_, anyhow::Error>((daemons, faucet))
}
};
cleanup_on_exit(main, task_group).await?;
}
TestCmd::LatencyTests { r#type, iterations } => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
latency_tests(dev_fed, r#type, None, iterations, true).await?;
}
TestCmd::ReconnectTest => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
reconnect_test(dev_fed, &process_mgr).await?;
}
TestCmd::CliTests => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
cli_tests(dev_fed).await?;
}
TestCmd::LoadTestToolTest => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
cli_load_test_tool_test(dev_fed).await?;
}
TestCmd::LightningReconnectTest => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
lightning_gw_reconnect_test(dev_fed, &process_mgr).await?;
}
TestCmd::GatewayRebootTest => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
gw_reboot_test(dev_fed, &process_mgr).await?;
}
TestCmd::RecoverytoolTests => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
recoverytool_test(dev_fed).await?;
}
TestCmd::GuardianBackup => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
guardian_backup_test(dev_fed, &process_mgr).await?;
}
TestCmd::CannotReplayTransaction => {
let (process_mgr, _) = setup(common_args).await?;
let dev_fed = dev_fed(&process_mgr).await?;
cannot_replay_tx_test(dev_fed).await?;
}
TestCmd::UpgradeTests { binary } => {
let (process_mgr, _) = setup(common_args).await?;
Box::pin(upgrade_tests(&process_mgr, binary)).await?;
}
}
Ok(())
}